IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed   
Managing Security Reports
 
Threat Intelligence Report November 2019
sponsored by Mimecast
WHITE PAPER: Mimecast threat researchers developed key insights about the types of attacks that proliferate each quarter, as well as new attacks cropping up. In this quarter’s report, learn about the modified forms of malware being used in impersonation attacks, the channels they go through, and the proactive security measures your organization can take.
Posted: 12 Dec 2019 | Published: 30 Nov 2019

Mimecast

Easy Ways to Dominate the Securities-as-a-Service Game
sponsored by RapidFire
WHITE PAPER: Download this paper to discover how establishing Securities-as-a-Service offerings in your MSP will not only remediate your customers’ internal vulnerabilities but will also result in additional revenue for you.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

RapidFire

Secure Cloud Transformation
sponsored by Menlo Security
WHITE PAPER: As a result of the increasing popularity of SaaS tools and applications, organizations are rethinking their infrastructure to include security without sacrificing user experience. In this white paper, take an in-depth look into strategic principles IT leaders are incorporating, and explore Menlo Security’s Cloud Platform.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Menlo Security

Isolation: Separating Malware from the Network, Not Devices
sponsored by Menlo Security
WHITE PAPER: As data breaches grow increasingly common, the need for network security has become essential. Many organizations are adopting separation tactics to protect their network, but what if there was a better way to protect your endpoints? In this white paper, go in-depth into the benefits and faults of isolation and network separation.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Menlo Security

Configuration Management: Addressing GRC Challenges
sponsored by ServiceNow
EGUIDE: Configuration management enables security teams to configure, update and patch systems more efficiently. In this e-guide, dive deeper into configuration management to learn some the key features, benefits, and how it can improve governance, risk management and compliance (GRC).
Posted: 21 Nov 2019 | Published: 15 Nov 2019

ServiceNow

Insider Threat Management in 2020 – What’s Your Plan?
sponsored by ActivTrak
RESOURCE: Whether malicious or accidental, insider attacks can leave organizations feeling vulnerable and eager to prevent future incidents, and a little bit of consideration can save time and money when incidents occur. Read this white paper to uncover the key areas to consider for your 2020 insider threat program checklist.
Posted: 10 Dec 2019 | Published: 21 Oct 2019

ActivTrak

BeyondCorp for the Enterprise
sponsored by Banyan Security
WHITE PAPER: Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Banyan Security

Mobile Commerce Fraud: A Rising Threat to Retailers
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: Retailers newer to the mobile channel say that fraud attempts have increased in the past year. Read this white paper explore mobile retail commerce and the factors that contribute to fraud.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

LexisNexis® Risk Solutions

Top CASB Use Cases
sponsored by BitGlass
RESOURCE: CASBs have quickly risen to prominence and become go-to solutions for securing cloud and mobile. However, because these platforms offer a wide range of capabilities, it can be challenging to identify which use cases are most relevant to an organization’s needs. IT leaders must consider all common CASB use cases to evaluate competing solutions.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

BitGlass

Castle Ventures Case Study
sponsored by Siemplify
CASE STUDY: Like most companies providing managed security services, Castle Ventures manages a variety of disparate technologies for its clients. In this case study, explore how Castle Ventures was able to address their overwhelming workload to streamline alerts, manage client security stacks and provide compliance reporting.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

Siemplify
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement